A survey on electronic coupons

JL Ferrer-Gomila, MF Hinarejos, L Huguet-Rotger - Computers & Security, 2018 - Elsevier
Coupons are a highly effective marketing tool. With coupons, merchants can achieve
customer loyalty or attract new customers, and customers can obtain benefits when …

A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps

H Zhu, X Hao - Nonlinear Dynamics, 2015 - Springer
Key agreement refers to two or more entities in negotiations, jointly establish a session key.
The session key is generated by each participant through a certain number of parameters …

Deployment and performance evaluation of mobile multicoupon solutions

MF Hinarejos, AP Isern-Deyà, JL Ferrer-Gomila… - International Journal of …, 2019 - Springer
Mobile commerce (m-commerce) represents an important area of business with a huge
potential revenue for merchants and great opportunities for customers to achieve better …

[PDF][PDF] A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network.

H Zhu, Y Zhang, Y Zhang, H Li - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Key agreement is a crucial cryptographic primitive for building secure communication
channels between two parties in a network. In the research literature a typical protocol aims …

[PDF][PDF] A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System.

H Zhu, Y Zhang, X Wang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Nowadays, the application of e-coupons is quite a novel issue but is becoming increasingly
popular among electronic commercial businesses owing to save much money by using the e …

[PDF][PDF] A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem.

H Zhu, X Hao, Y Zhang, M Jiang - J. Inf. Hiding Multim. Signal …, 2015 - bit.kuas.edu.tw
Nowadays chaos theory is widely used in cryptography. In the real world, in order to ensure
secure communication, many chaotic maps-based key agreement protocols have been …

CCMbAS: A Provably Secure CCM‐Based Authentication Scheme for Mobile Internet

Y Zhang, G Sun, P Zhai - Mobile Information Systems, 2022 - Wiley Online Library
To improve the security of authentication system and strengthen privacy protection in mobile
Internet environment, this paper proposes a provably secure Chebyshev chaotic map (CCM) …

An architecture for anonymous mobile coupons in a large network

A Bartoli, E Medvet - Journal of Computer Networks and …, 2016 - Wiley Online Library
A mobile coupon (m‐coupon) can be presented with a smartphone for obtaining a financial
discount when purchasing a product or a service. M‐coupons are a powerful marketing tool …

Analysis and improvement of 'chaotic map based mobile dynamic id authenticated key agreement scheme'

D Guo, Q Wen, W Li, H Zhang, Z Jin - Wireless Personal Communications, 2015 - Springer
In distributed networks, anonymous user authentication is crucial to enable authorized
access and guard privacy. Recently, Lin proposed a chaotic map-based anonymous mobile …

Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment

SW Park, IY Lee - The Journal of Supercomputing, 2019 - Springer
The union of near-field communication (NFC) and mobile devices has led to significant
changes in payment systems over recent years. Currently, NFC-based services are the …